|
Message-ID: <alpine.LRH.2.21.1908221621220.24302@fairfax.gathman.org> Date: Thu, 22 Aug 2019 16:28:38 -0400 (EDT) From: "Stuart D. Gathman" <stuart@...hman.org> To: oss-security@...ts.openwall.com Subject: Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2 Since we're arguing... What would worry me is an exploit where I allow a friend to connect their USB flash drive, it operates normally to all appearances. Nothing is auto-executed by a stupid OS (like the Iran centrifuge worm). But, the device is able to insert some privileged code through low level protocol bugs - all while operating normally as a USB storage device. It is not obvious how any of the USB bugs just reported could be exploited that way - but anytime you have buffer overflows and stuff, some evil genius might find a way. I also worry about file system bugs doing something similar on any removeable media, or downloaded image. On Thu, 22 Aug 2019, Eddie Chapman wrote: > On 22/08/2019 20:00, Perry E. Metzger wrote: >> You can argue anything you like. Power charging points have popped up >> around the world, and you're not in a position to stop >> them. Furthermore, I'll note that over the air exploitable bugs in >> things like WiFi stacks and Bluetooth stacks have also appeared over >> time; perhaps it's foolish to have your phone on at all, and yet >> people will continue to turn their phones on, and even to use them. -- Stuart D. Gathman <stuart@...hman.org> "Confutatis maledictis, flamis acribus addictis" - background song for a Microsoft sponsored "Where do you want to go from here?" commercial.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.